Kumar V. Mangipudi

Learn More
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an efficient user identification and key distribution protocol while preserving user anonymity. Their protocol addresses a weakness in the protocol proposed by Wu and Hsu. Unfortunately,(More)
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server anonymity (USAP). The proposed protocols have the following(More)
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that the user's identity is transmitted in plain during the authentication process, which allows an attacker to monitor the user's activities. In many cases, the user's anonymity is a(More)
Aydos, Savas and Koç proposed a wireless authentication and key agreement protocol (ASK-WAP) based on Elliptic Curve Cryptography (ECC). We find that this protocol is vulnerable to a man-in-the-middle attack, a denial-of-service attack and an impersonation attack. In this paper, we present the above mentioned attacks on the ASK-WAP. We also propose a(More)
In this paper we describe a Montgomery multiplier for elements of GF(2 m) defined by a type II pentanomial. The multiplier described is similar to Wu's multiplier in [2, 3] which was defined for trinomials. In [2, 3] Wu showed that the Montgomery multiplier requires the same number of XOR and AND gates as other multipliers and that the time taken for the(More)
Security assurance is a rapidly evolving but well understood discipline in the software industry. Many firms have adopted the Security Development Lifecycle as a process to identify and fix vulnerabilities in their products before they are released. To do this, they rely on sound software security practices, tools and precise technical information available(More)
Braking device using counter electromotive force for the ergonomic assisted manipulation of large payloads',Optimal design of safe planar manipulators using passive torque limiters',A comparison of the effectiveness of different approaches for the design of human-friendly robots', to appear in the ASME Journal of Mechanical Design. 'Time-optimal trajectory(More)
  • 1